Memory Attacks on Device-Independent Quantum Cryptography

被引:113
作者
Barrett, Jonathan [1 ,2 ]
Colbeck, Roger [3 ,4 ]
Kent, Adrian [4 ,5 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford OX1 3QD, England
[2] Univ London, Dept Math, Egham TW20 0EX, Surrey, England
[3] ETH, Inst Theoret Phys, CH-8093 Zurich, Switzerland
[4] Perimeter Inst Theoret Phys, Waterloo, ON N2L 2Y5, Canada
[5] Univ Cambridge, Ctr Math Sci, DAMTP, Ctr Quantum Informat & Fdn, Cambridge CB3 0WA, England
基金
英国工程与自然科学研究理事会; 瑞士国家科学基金会;
关键词
D O I
10.1103/PhysRevLett.110.010503
中图分类号
O4 [物理学];
学科分类号
070305 [高分子化学与物理];
摘要
Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party). DOI: 10.1103/PhysRevLett.110.010503
引用
收藏
页数:5
相关论文
共 23 条
[1]
Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[2]
From Bell's theorem to secure quantum key distribution [J].
Acin, Antonio ;
Gisin, Nicolas ;
Masanes, Lluis .
PHYSICAL REVIEW LETTERS, 2006, 97 (12)
[3]
[Anonymous], ARXIV10091833
[4]
No signaling and quantum key distribution [J].
Barrett, J ;
Hardy, L ;
Kent, A .
PHYSICAL REVIEW LETTERS, 2005, 95 (01)
[5]
Barrett J., ARXIV12090435
[6]
Maximally nonlocal and monogamous quantum correlations [J].
Barrett, Jonathan ;
Kent, Adrian ;
Pironio, Stefano .
PHYSICAL REVIEW LETTERS, 2006, 97 (17)
[7]
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[8]
PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[9]
PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES [J].
CLAUSER, JF ;
HORNE, MA ;
SHIMONY, A ;
HOLT, RA .
PHYSICAL REVIEW LETTERS, 1969, 23 (15) :880-&
[10]
COLBECK R, 2007, ARXIV09113814